OPTIGA™ TPM

Overview

Protecting integrity and authenticity of embedded devices and systems

OPTIGA™ TPM (Trusted Platform Module) offers a broad portfolio of standardized security controllers to protect the integrity and authenticity of embedded devices and systems. With a secured key store and support for a variety of encryption algorithms, OPTIGA™ TPM security chips provide robust protection for critical data and processes through their rich functionality.

Market news

New whitepaper

Standardized and certified protection for a broad range of applications

OPTIGA™ TPM security controllers are ideal for platforms running both Windows and Linux (and its derivatives)*. Based on Trusted Computing Group (TCG) standards, they support the TPM 1.2 or the latest innovative TPM 2.0 standard.

In a bid to meet rising demand for security, many manufacturers and system providers are looking for customized, easy-to-implement solutions that support rapid design-in and deployment by integrating seamlessly into existing and new computing designs. The Trusted Computing Group (TCG) has defined a range of open, vendor-neutral, global industry standards to support interoperable, Trusted Computing platforms. Trusted Computing aims to detect unauthorized changes to a system based on an established security anchor embedded in a computing device. This is achieved with a dedicated microprocessor to support the secured integration of cryptographic keys into the device. The basic keys stored in the Trusted Platform Module (TPM) are processed and used internally, with all cryptographic functions being protected. Long established in computer designs, Trusted Computing is now moving into a much broader application spectrum across industries as diverse as automotive and industrial automation.

As one of the founding members and key drivers within TCG, Infineon continues to bring the benefits of standardization to its customers. Our aim is to provide you with strong, proven security solutions offering reduced integration effort. You can build on our long-standing expertise and reliability to protect sensitive data, establish strong machine identity and integrity, and support secure authentication by protecting certificates, keys and passwords. Backed by our global support team, we offer a market-leading range of OPTIGA™ TPM products supporting all standard interfaces over a wide temperature range. In fact, we were the first semiconductor player to complement our TPM 1.2 offering with a TPM 2.0 product to support the next generation of embedded Trusted Computing applications. Find out more about our OPTIGA™ TPM family and how our portfolio scales across interfaces, packages and temperature ranges to meet individual application needs.

The IoT Solutions World Congress awarded Infineon for Best Solution in Manufacturing. Mocana, who recently joined the Infineon Security Partner Network (ISPN) and Infineon take security for IoT to the next level by combining advanced security features with our highly valued and widely used OPTIGA™ TPM.

Documents

Boards

Tools & Software

Intermediate CAs for the creation of certificates for the respective product and firmware version

Securing communication in the Internet of Things – Raspberry Pi with OPTIGA™ TPM

2:36

To protect transferred data and enable the reliable operation of devices, strong security measures are crucial. Check out the demo how using a Raspberry Pi board with an Infineon OPTIGA™ TPM enables secured communication of connected devices.

Secured industrial networks with OPTIGA™ TPM

4:45

This demo shows how sensitive data can be communicated through secured channels from one production site to another using OPTIGA™ TPM (Trusted Platform Module).

In order to optimize your browsing experience Infineon uses cookies. You agree to the usage of cookies when you continue browsing this site. For more information regarding cookies and the processing of your personal data please read our Privacy Policy.